Joe Wenjie Jiang
Joe Wenjie Jiang
Research Engineer at Google Deepmind
Verified email at - Homepage
Cited by
Cited by
Joint VM placement and routing for data center traffic engineering
JW Jiang, T Lan, S Ha, M Chen, M Chiang
2012 Proceedings IEEE INFOCOM, 2876-2880, 2012
A graph placement methodology for fast chip design
A Mirhoseini, A Goldie, M Yazgan, JW Jiang, E Songhori, S Wang, YJ Lee, ...
Nature 594 (7862), 207-212, 2021
Donar: decentralized server selection for cloud services
P Wendell, JW Jiang, MJ Freedman, J Rexford
Proceedings of the ACM SIGCOMM 2010 conference, 231-242, 2010
Cooperative content distribution and traffic engineering in an ISP network
W Jiang, R Zhang-Shen, J Rexford, M Chiang
Proceedings of the eleventh international joint conference on Measurement …, 2009
Chip placement with deep reinforcement learning
A Mirhoseini, A Goldie, M Yazgan, J Jiang, E Songhori, S Wang, YJ Lee, ...
arXiv preprint arXiv:2004.10746, 2020
Performance bounds for peer-assisted live streaming
S Liu, R Zhang-Shen, W Jiang, J Rexford, M Chiang
Proceedings of the 2008 ACM SIGMETRICS international conference on …, 2008
Anomaly detection with graph convolutional networks for insider threat and fraud detection
J Jiang, J Chen, T Gu, KKR Choo, C Liu, M Yu, W Huang, P Mohapatra
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 109-114, 2019
Orchestrating massively distributed CDNs
W Jiang, S Ioannidis, L Massoulié, F Picconi
Proceedings of the 8th international conference on Emerging networking …, 2012
On the interaction of multiple overlay routing
W Jiang, DM Chiu, JCS Lui
Performance Evaluation 62 (1-4), 229-246, 2005
A two-stage model based on BERT for short fake news detection
C Liu, X Wu, M Yu, G Li, J Jiang, W Huang, X Lu
Knowledge Science, Engineering and Management: 12th International Conference …, 2019
A deep learning based online malicious URL and DNS detection scheme
J Jiang, J Chen, KKR Choo, C Liu, K Liu, M Yu, Y Wang
Security and Privacy in Communication Networks: 13th International …, 2018
Tradeoffs in CDN designs for throughput oriented traffic
M Yu, W Jiang, H Li, I Stoica
Proceedings of the 8th international conference on Emerging networking …, 2012
Potential of esterase DmtH in transforming plastic additive dimethyl terephthalate to less toxic mono-methyl terephthalate
X Cheng, S Dong, D Chen, Q Rui, J Guo, D Wang, J Jiang
Ecotoxicology and Environmental Safety 187, 109848, 2020
Interaction of ISPs: Distributed resource allocation and revenue maximization
SCM Lee, JWJ Jiang, DMC Chiu, JCS Lui
IEEE Transactions on Parallel and Distributed Systems 19 (2), 204-218, 2008
Promoter engineering enables overproduction of foreign proteins from a single copy expression cassette in Bacillus subtilis
C Zhou, B Ye, S Cheng, L Zhao, Y Liu, J Jiang, X Yan
Microbial Cell Factories 18 (1), 1-11, 2019
Incentive mechanism and protocol design for crowdsourcing systems
H Xie, JCS Lui, JW Jiang, W Chen
2014 52nd annual Allerton conference on communication, control, and …, 2014
Hydrolase CehA and monooxygenase CfdC are responsible for carbofuran degradation in Sphingomonas sp. strain CDS-1
X Yan, W Jin, G Wu, W Jiang, Z Yang, J Ji, J Qiu, J He, J Jiang, Q Hong
Applied and Environmental Microbiology 84 (16), e00805-18, 2018
To coordinate or not to coordinate? wide-area traffic management for data centers
S Narayana, JW Jiang, J Rexford, M Chiang
Dept. Comput. Sci., Princeton Univ., Princeton, NJ, USA, Tech. Rep. TR-998-15, 2012
Azade Nazi, Jiwoo Pak, Andy Tong, Kavya Srinivasa, William Hang, Emre Tuncer, Quoc V. Le, James Laudon, Richard Ho, Roger Carpenter, and Jeff Dean. 2021. A graph placement …
A Mirhoseini, A Goldie, M Yazgan, JW Jiang, E Songhori, S Wang, YJ Lee, ...
Nature 594 (7862), 207-212, 2021
ALDD: a hybrid traffic-user behavior detection method for application layer DDoS
J Jiang, Q Yu, M Yu, G Li, J Chen, K Liu, C Liu, W Huang
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20